How DiamondIT is supporting clients during the COVID-19 (coronavirus)

Anyone Can Be a Victim of Identity Theft: How to Protect Yourself If Your Identity Has Been Breached

David Rice, COO of DiamondIT, is technically sophisticated and knows how to protect his personal and professional data.

But not long ago, David found that he had become a victim of identity theft.

Here is the rub.  People do not always have control over their personal data.

2019 Cyberthreat Predictions

Cybercrime is not a new problem, but one that keeps evolving as technology itself progresses.  As we enter into 2019, the cybercrime conundrum continues: it is not a matter of IF a company or institution will be targeted by cybercriminals, but WHEN.

CyberSecurity Trends – A Year in Review

Now that we are a few months into 2018, security analysts are able to look back on 2017 and analyze leading cybersecurity trends. Not surprisingly, according to the Cisco 2018 Annual Cybersecurity report, there was an elevenfold increase in malware last year.

“Adversaries are becoming more adept at evasion— and weaponizing cloud services and other technology used for legitimate purposes,” the report declares.

The following are some of the major cybersecurity trends of 2017:

Ransomware Families Up 32%, Total Ransomware Threats Down 41%
According to Dark Reading, the growth in ransomware attacks hit a plateau, while the number of ransomware families rose considerably. As cybercriminals become more adept in targeting individuals and organizations, the variety of ransomware attacks are evolving. Not surprisingly, the WannaCry variant dominated the landscape – making up 57% of all ransomware detected last year.

Meltdown and Spectre Patching – What You Need to Know

Image result for meltdown spectreRecent complex vulnerabilities in top-tier computer devices, iPhones, Windows PCs, Android devices and other gadgets have sent companies and individuals alike in a tailspin. A critical security flaw has been detected in processor chips that allow bottom barrel IT processes to have access to memory in the computer’s kernel – aka the most privileged IT process of the device.

Not good.

Hackers could potentially exploit this issue giving them a clear path for installing malicious software to read memory through this new group of side-channel attacks and putting data, hardware and software at serious risk.

Here are the immediate steps you need to take to make sure your data and infrastructure are protected: